Resubmissions

23-05-2023 13:55

230523-q8krnsfe54 3

23-05-2023 13:40

230523-qyzg3sgd21 8

23-05-2023 13:38

230523-qxc8fsgd2w 8

23-05-2023 12:40

230523-pwbskafc46 10

General

  • Target

    test.bat

  • Size

    370B

  • Sample

    230523-qxc8fsgd2w

  • MD5

    1157be1803e2f740eec3a0c69aa44625

  • SHA1

    5963efa7895a6748e74f0aeb94a3b3856787b8c5

  • SHA256

    42c77f89ea1a298098ecf3e8939f6c5ccd005742d0482047ee26fbf56728c684

  • SHA512

    04d698560789eb87f9fdbc32468557d05655558d289749f263fba4cdeb26b1cf83c214c316d60184856a935a9da757a62c361ca8e41804b59606a068a18f3899

Score
8/10

Malware Config

Targets

    • Target

      test.bat

    • Size

      370B

    • MD5

      1157be1803e2f740eec3a0c69aa44625

    • SHA1

      5963efa7895a6748e74f0aeb94a3b3856787b8c5

    • SHA256

      42c77f89ea1a298098ecf3e8939f6c5ccd005742d0482047ee26fbf56728c684

    • SHA512

      04d698560789eb87f9fdbc32468557d05655558d289749f263fba4cdeb26b1cf83c214c316d60184856a935a9da757a62c361ca8e41804b59606a068a18f3899

    Score
    8/10
    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks